Hit enter to search or ESC to close
GalaxkeyGalaxkey
  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
Category

Business

Business

Seven advantages of data backups for enterprises

Across the UK, businesses use mobile devices and desktop computers to search through data and…
Lydia
Lydia26th November 2020
Business

Three essential security practices for malware protection

The National Cyber Security Centre (NCSC) website recommends that companies should always work on the…
Brad
Brad18th November 2020
Business

What’s your company’s digital footprint?

Among the latest attacks made on enterprises by cybercriminals are spear phishing tactics. These campaigns…
Brad
Brad16th October 2020
Business

How to report suspicious emails

Phishing emails are a prevalent plague to both companies and individuals across the UK. While…
Lydia
Lydia22nd June 2020
BusinessEncryption News

NCSC Certification Achievement – Galaxkey has the government seal of approval

Galaxkey is very proud to announce that we have achieved certified CPA compliance from the…
Richard Oliver
Richard Oliver30th March 2020
BusinessEncryption News

5 steps to digital security when your employees work from home

In an ideal world, working from home offers great advantage to an office-based business and…
Galaxkey Security
Galaxkey Security16th March 2020

Recent Posts

  • Three types of Distributed Denial of Service (DDoS) attacks
  • Is Your Business Data Being Used Without Your Consent?
  • Three reasons why document transfers should use digital signatures
  • What does a man in the middle (MITM) attack involve?
  • What’s wrong with using FTP for transferring large files?

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • November 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • June 2017
  • March 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • October 2014
  • September 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • April 2012

Categories

  • Business
  • Clickjacking
  • Cyberattack
  • Data Protection
  • Electronic Signatures
  • Email
  • Encryption News
  • File Integrity Monitoring
  • Middle East & Asia
  • News
  • Phishing
  • Ransomware
  • Release News
  • Spoofing
  • Trojan
  • Uncategorised

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About The Blog

Aiming to bring you the latest news and articles from the world of cybersecurity.

Recent Posts

  • Three types of Distributed Denial of Service (DDoS) attacks 18th January 2021
  • Is Your Business Data Being Used Without Your Consent? 18th January 2021
  • Three reasons why document transfers should use digital signatures 17th January 2021
  • What does a man in the middle (MITM) attack involve? 16th January 2021
  • What’s wrong with using FTP for transferring large files? 15th January 2021

Contact

2 Falcon Gate Shire Park
Welwyn Garden City
AL7 1TW

+44 (0) 333 150 6660

info@galaxkey.com


Discover

  • Case Studies
  • FAQ
  • Compliance
  • Legal

Galaxkey Tweets

GalaxkeyFollow

Galaxkey
GalaxkeyGalaxkey@Galaxkey·
1h

Social media icons hide skimming malware
▸ https://lttr.ai/bzvS

#LatestArticle #GalaxkeyBlog #Encryption #Cybersecurity #DataProtection #InsertingSkimmerScripts #PaymentDataEntered #CybercriminalGroupSServers #SkimCreditCards #ScalableVectorGraphic

Reply on Twitter 1351128285749637123Retweet on Twitter 1351128285749637123Like on Twitter 13511282857496371231Twitter 1351128285749637123
GalaxkeyGalaxkey@Galaxkey·
4h

Earlier this year, one of the biggest IT managed services firms in the world, Cognizant, made headlines following an attack by the now retired Maze ransomware group.

Read more 👉 https://lttr.ai/bzXe

#RansomwareAttack #Encryption #Cybersecurity #Ransomware

Reply on Twitter 1351088019617574914Retweet on Twitter 13510880196175749142Like on Twitter 13510880196175749141Twitter 1351088019617574914
GalaxkeyGalaxkey@Galaxkey·
5h

Remember that hackers who can access a real email account have no need to fake your address with spoofing tactics.

Read the full article: How to stop my email address from being spoofed
▸ https://www.galaxkey.com/blog/how-to-stop-my-email-address-from-being-spoofed/?utm_campaign=how-to-stop-my-email-address-from-being-spoofed&utm_medium=social_link&utm_source=missinglettr

#Encryption #Cybersecurity #GalaxkeyBlog #Spoofing

Reply on Twitter 1351072939454705665Retweet on Twitter 13510729394547056652Like on Twitter 1351072939454705665Twitter 1351072939454705665
GalaxkeyGalaxkey@Galaxkey·
17 Jan

The header of an email contains records of the verification process employed by your mail provider to assess if the server sending the email had correct permission to use the domain.

Read the full article: Is there an email spoofing test?
▸ https://www.galaxkey.com/blog/is-there-an-email-spoofing-test/?utm_campaign=is-there-an-email-spoofing-test&utm_medium=social_link&utm_source=missinglettr

#Encryption

Reply on Twitter 1350750823333171200Retweet on Twitter 13507508233331712001Like on Twitter 1350750823333171200Twitter 1350750823333171200
GalaxkeyGalaxkey@Galaxkey·
17 Jan

Along with offering practical advice on dealing with scam emails, the NCSC also provides a service designed to help companies and individuals report these malicious messages.

Read more 👉 https://lttr.ai/bxhx

#ReportFraudulentEmails #LatestArticle #GalaxkeyBlog

Reply on Twitter 1350725620083388418Retweet on Twitter 1350725620083388418Like on Twitter 1350725620083388418Twitter 1350725620083388418

2010-2021 Galaxkey Limited. All Rights Reserved

  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
  • Download
  • Trial
  • Support